First published: Fri Feb 21 2020(Updated: )
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to "a number of underlying issues" in which "some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code."
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Domino | >=8.5.0<=8.5.3.6 | |
IBM Notes | >=8.5<=8.5.3 | |
Symantec Data Loss Prevention Endpoint | >=11.0<11.6.1 | |
Symantec Data Loss Prevention Enforce\/detection Servers | >=11.0<11.6.1 | |
Symantec Data Loss Prevention Enforce\/detection Servers | >=11.0<11.6.1 | |
Symantec Mail Security | <=6.5.7 | |
Symantec Mail Security | <=8.1.0 | |
Symantec Mail Security | =6.5.7 | |
Symantec Messaging Gateway | >=9.5<10.0.1 | |
Hp Autonomy Keyview Idol | <10.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6277 refers to multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16.
The software affected by CVE-2012-6277 include Symantec Mail Security for Microsoft Exchange, Symantec Mail Security for Domino, Symantec Messaging Gateway, Symantec Data Loss Prevention (DLP), IBM Notes, and Autonomy KeyView IDOL.
CVE-2012-6277 has a severity rating of 7.8, which is considered critical.
To fix CVE-2012-6277, it is recommended to update Autonomy KeyView IDOL to version 10.16 or later and apply the necessary patches for the affected software.
You can find more information about CVE-2012-6277 on Symantec's support website, Cisco's security center, and Vulmon's vulnerability details page.